Peering Analysis: GenieATM 6000 July 2013

Size: px
Start display at page:

Download "Peering Analysis: GenieATM 6000 July 2013"

Transcription

1 Application Note Peering Analysis: July Application background As the internet activity is expected to expand continuously, ISPs across the globe are looking for ways to optimize their operations economically. Each ISP needs to find its own way to function in the Internet Peering Ecosystem. Having a suitable peering policy with peering business model is important for an ISP to maximize business opportunities or to minimize operation costs. A successful peering relationship should have an improved network performance while lowering operation costs or creating revenue for ISPs. GenieATM generates various peering analysis reports to assist ISPs with evaluating the suitable peering candidates and subsequently optimizing the peering relationship through traffic engineering and network planning. With BGP routing information, GenieATM can target a specific AS to carry out the relevant traffic and cost analysis as required and provide quantitative results for fair evaluation. 2. Internet Peering Ecosystem Internet Peering describes a business relationship among ISPs in which companies reciprocally provide internet access to each other s customers. Due to the difference in business and network scales, ISPs have developed various business relationships as to how they interconnect their networks and hence the Internet Peering Ecosystem. Each Internet (geopolitical) Region typically includes Tier 1 ISPs, Tier 2 ISPs, Content Provider and Enterprises, and Large Scale Network Savvy Content Providers. 2.1 Tier 1 ISPs Peering Full Mesh Peering A Tier 1 ISP has access to all of the routing tables in the regional internet solely through peering relationships. In an interconnect region, Tier 1 ISPs usually have a full mesh peering relationship with other Tier 1 ISPs and are therefore generally not interested in peering with the rest of the players ( Restrictive Peering Policy ) who can potentially be paying customers to Tier 1 ISPs. This no-peering relationship largely differentiates Tier 1 ISPs from other service providers. Genie Networks Ltd. 1

2 2.2 Tier 2 ISPs Peering Open Peering Policy Tier 2 ISPs are the ones who purchase and resell transit within an Internet region. As Tier 2 ISPs resell transit for business, they would actively look for opportunities to increase the number of peering they have to reduce their own transit costs. 2.3 Content Provider & Enterprise Peering Purchaser As content provider and enterprise players main focus is to provide and create content to customers and users, they usually do not operate networks or sell transit and hence always buy transit from ISPs No Peering Policy. 2.4 Large Scale Network Savvy Content Providers Large Scale Network Savvy Content Providers purchase transit but have also adopted peering as a strategy to lower their traffic expenses owing to their large traffic volume. This not only reduces transit costs but also gives large content providers greater control over routing to improve traffic performance hence improving end-user experience. Content Delivery Network Players have an Open Peering Policy similar to Tier 2 ISPs and peer with various ISPs aiming to deliver services from a place closer to the eyeballs by storing cached web objects at the edge of network. 2.5 Free Peering vs. Paid Peering For Free Peering relationship to be established, the traffic volume exchanged needs to be roughly balanced for both parties to make sense financially and the not-to-exceed-ration is around 2:1. In contrast, Paid Peering is a business model developed between Large Scale Network Savvy Content Providers and ISPs in which physical peering is established but is priced the same way as transits. 2.6 Peering Policy Lifecycle Within each Internet Peering Ecosystem, service providers usually go through a 5-stage peering policy lifecycle in which they have adapted different peering policies at different stages to suit their business development. At the initial stage, service providers begin as small Tier 2 ISPs and focus on reducing their IP transit cost by having as many free peering partners as they could regardless of network size; this is generally referred as an Open peering policy. As the size of peering network grows, Tier 2 ISPs would begin to concern about network performance and having control over their routings as well as making effort in meeting requirements of other selective networks. Eventually, they become selective about the networks to peer and would limit their peering activities with the more important networks by setting peering criteria. Next, large Tier 2 ISPs would have already established a large peering network except with the restrictive networks who are not interested in having new peers. At this stage, large Tier 2 ISPs would leverage external business relationships in order to secure peering with restrictive peers. Lastly, the ISPs have entered the Genie Networks Ltd. 2

3 category as restrictive Tier 1 ISPs and have established an enormous network and peer with only other large ISPs. 3. Peering Analysis 3.1 Peering Evaluation - Selective Peering Selective ISPs may receive hundreds of peering requests each year and thus require an easy solution to analyse the traffic to / from the requesting network. GenieATM supports Selective ISPs by generating the required reports and creating a set of filters to examine the traffic exchanged with the specific ASN. Selective ISPs can make decisions about the peering requests based on the statistics from the reports. Figure 3.1: Filter configuration for a Peer ASN Top-N analysis Figure 3.2: Rule-based report created for a specific AS Figure 3.1 shows how a filter is created for a specific AS to obtain the respective traffic information using GenieATM. A report is then generated (figure 3.2) to display all the traffic information coming From / Thru and the amount of traffic going To / Thru that specific AS. Such information is particularly useful when evaluating a potential peering candidate. Provided that the amount of Genie Networks Ltd. 3

4 traffic exchanged is sufficient, traffic distribution of From and To the AS should be approximately balanced and not exceeding 2:1 for the AS to be a suitable peering partner. 3.2 Peering Evaluation - Open Policy For those ISPs wish to peer with as many ISPs as possible, it is important for them to carry out some qualitative and quantitative analyses to ensure the peering relationship will be effective both financially and technically. GenieATM provides a proficient tool for ISPs to identify and evaluate a suitable new peering candidate. Figure 3.3: Top-N traffic report of peer for To and Thru traffic analysis Firstly, use the Peering Analysis Top-N reports and identify the Top ASN with the most traffic volume. Then, find an ASN and compare the In / Out traffic ratio to see if the exchanged traffic volume is approximately balanced for both parties. An ISP would consider peering with another only when the exchanged traffic volume is similar both ways. Lastly, compare the To / Through traffic distribution to check how much of the traffic is originated from the potential peer. If the majority of the traffic is originated from that AS ( To traffic), or evenly comes from several other ASs ( Thru traffic) which can be found using filter configuration to generate another Top-N report, then this AS would be the suitable candidate to peer. Conversely, if most of the traffic is Thru traffic coming from another AS then this other AS may be considered as a more suitable candidate to peer with. The same process can be reapplied again to this other AS to generate Top-N reports for further examining the traffic distribution. This both simplifies and quantifies the traffic evaluating process. GenieATM provides abundant analyses allowing ISPs to choose the right peering partners efficiently which is imperative for ISPs with open peering policy. 3.3 Peering Evaluation Restrictive Policy For ISPs with restrictive peering policy (mostly Tier 1 ISPs), the main focus of peering analysis is to enhance the network performance through network planning and traffic engineering, i.e. peering optimization. Genie Networks Ltd. 4

5 Various BGP policies can be applied to build the preferred AS path / BGP route to decide how traffics arrive and leave an AS in order to utilize ISP s network resources. GenieATM provides reports with detailed BGP attributes information which can be of useful when configuring and applying BGP policies. BGP policies can be applied to set MED (Multi-Exit Discriminator) or AS Padding to load balance inbound traffic from an AS. For the outbound traffic, BGP policies are used to favour one peer interface over another for routes from specific ASNs and can be achieved by setting Local Preference given that both interfaces have access to the same ASN. GenieATM monitors the traffic load of Interfaces of Neighbour / Sub-networks and generates various reports with different filter configurations (e.g. Prefix, Origin ASN, Peer ASN, AS Path, etc.) to breakdown BGP attribute traffic at an interface. This can be examined by creating a Filter to show the Origin ASN traffic distribution (figure 3.4) as well as creating a filter to show the Peer ASN traffic distribution of the specific ASN in order to find a specific peer to offload traffic to. GenieATM gives accurate traffic volume in the Top-N reports which can be used as reference to determine precisely how much traffic to be offloaded from the congested routes and the effect on the new route. The distribution of traffics can be evenly allocated avoiding over-offloading traffic from one to another. Reports can also be generated to show who the top talkers / listeners are that is reached via a specific peer and based on traffic analysis, may potentially peer with that AS directly. GenieATM assists ISPs with offloading traffics from expensive or unstable peers through traffic engineering to ensure network operations and optimize network performance. Figure 3.4: Rule-based report of a specific ISP Top-N Origin ASN analysis 4. Cost Analysis Direct peering with another AS would require some upfront fixed cost and equipment investments. Once the potential peering candidate is identified, further evaluation is therefore required to ensure the cost and investment needed to establish a new peer is justified on the long run. GenieATM provides the essential traffic information for carrying out the peering cost analysis. By using the Filters and rule-based reporting on GenieATM, a specific ASN of an ISP can be targeted to generate a Top-N report with traffic statistics. The potential savings with the new peering can be Genie Networks Ltd. 5

6 calculated using peering fixed costs and the generated traffic information. A simple equation of potential monthly cost saving could be calculated by the example equation below. Figure 4.1: New peer cost analysis and evaluation The Monthly cost saved can be calculated simply by subtracting total peering fixed costs (transport cost to Internet Exchange, peering port costs, and exchange centre rentals) from the current transit costs (transit rate x potential saved traffic volume). The resulted Monthly cost saved needs to be equal or greater than zero for the peering relationship to benefit financially. GenieATM provides ISPs a comprehensive solution which quantifies the cost analysis for peering and largely simplifies the decision process. 5. Peer Monitoring The stability and reliability of a peer largely affects the quality and security of a network. An unstable peer could consume more network resource than originally planned. GenieATM monitors the peering relationships for ISPs to ensure the performance of existing peers. GenieATM offers breakdown reports on peer partners and monitors the BGP stability via the change in number of BGP messages exchanged and prefixes announced. Alerts are generated when an unusual, huge churn of number message updates occurs (figure 5.1) which usually signifies an unstable peer. GenieATM also provides traffic visibility which can be used to monitor the effect of traffic engineering after offloading traffic from a heavy loaded route. Genie Networks Ltd. 6

7 Figure 5.1: BGP Message monitoring and real-time alerts 6. Conclusion GenieATM provides ISPs with abundant traffic reports and peering analyses not only to identify the optimal peering partners but also to evaluate the technical and financial benefit of the new peer. GenieATM offers filter configuration and Top-N traffic reports which can be used to carry out various peering analyses to suit ISPs with different peering policies. New peering candidate can be found through the Top-N traffic report and the To / Thru traffic distribution. Top-N reports also provide the required information for cost analysis for new peer investment justification. The traffic distribution report provides BGP attributes information as reference for traffic engineering and through applying BGP policies to utilise network resources and avoid route congestion. In addition to traffic analysis, GenieATM monitors the stability and reliability of the existing peers to ensure the performance of route and network. GenieATM offers ISPs with a complete solution for peering analysis to suit various business modes and gives ISPs an enhanced network management and network optimisation. About Genie Networks Genie Networks is a leading provider of IP flow-based network traffic analysis and security solutions. Our GenieATM offers network-wide, cost-effective traffic visibility and threat detection, which optimizes operation and enhances revenue for fixed and mobile broadband operators. GenieATM s Network Behaviour Analysis-based (NBA-based) DDoS prevention capability enhances operators network infrastructure security in a network-wide scope. GenieATM product series encompasses, GenieATM Flow Load Balancer, and GenieATM MSP server, which are all developed specifically to serve tier-1 ISPs. Through on-going technology innovations, Genie Networks solutions have been market-proven by a number of tier-1 telecoms and blue-chip enterprises worldwide. To date over 1,000 GenieATM network appliances have been deployed serving over 450 customers worldwide. For more information, please visit Genie Networks Ltd. 7

Intelligent Routing Platform White Paper

Intelligent Routing Platform White Paper White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

The Value of Peering. ISP/IXP Workshops

The Value of Peering. ISP/IXP Workshops The Value of Peering ISP/IXP Workshops 1 The Internet Internet is made up of ISPs of all shapes and sizes Some have local coverage (access providers) Others can provide regional or per country coverage

More information

BGP Attributes and Path Selection

BGP Attributes and Path Selection BGP Attributes and Path Selection ISP Workshops Last updated 29 th March 2015 1 BGP Attributes BGP s policy tool kit 2 What Is an Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes

More information

Border Gateway Protocol BGP4 (2)

Border Gateway Protocol BGP4 (2) Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning

More information

Internet Routing Protocols Lecture 04 BGP Continued

Internet Routing Protocols Lecture 04 BGP Continued Internet Routing Protocols Lecture 04 BGP Continued Advanced Systems Topics Lent Term, 008 Timothy G. Griffin Computer Lab Cambridge UK Two Types of BGP Sessions AS External Neighbor (EBGP) in a different

More information

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service

More information

Introduction to Routing

Introduction to Routing Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,

More information

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution The Challenge Businesses that rely on Microsoft Lync Server must guarantee uninterrupted

More information

Network-Wide Capacity Planning with Route Analytics

Network-Wide Capacity Planning with Route Analytics with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and

More information

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

Flow Analysis. Make A Right Policy for Your Network. GenieNRM Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do

More information

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

The Role IXPs and Peering Play in the Evolution of the Internet

The Role IXPs and Peering Play in the Evolution of the Internet The Role IXPs and Peering Play in the Evolution of the Internet PTC 14, New World, New Strategies, 19-22 January 2014 Steve Wilcox, President and CTO, IX Reach A Quick Introduction Steve Wilcox founded

More information

ISPA Guidelines and Recommendations on Broadband Terminology

ISPA Guidelines and Recommendations on Broadband Terminology ISPA Guidelines and Recommendations on Broadband Terminology Version: 1.01 Date: 2011-06-27 1. Introduction The Internet Service Providers' Association (ISPA) has identified a need to develop a set of

More information

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone

More information

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com

More information

BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL

BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL BEREC report on IPinterconnection in the context of Net Neutrality BEUC statement Contact: Guillermo Beltra digital@beuc.eu Ref.: X/2012/062-09/08/2012 BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL

More information

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 January 29th, 2008 Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. way-back machine Web 1998 way-back

More information

Internet Service Providers: Peering and Charging

Internet Service Providers: Peering and Charging Internet Service Providers: Peering and Charging UZH HS14 Seminar Internet Economics Markus Cadonau, Sofia Orlova Overview ISP Relationships Internet Hierarchy Peering: Potential and Process Challenges

More information

Edge Configuration Series Reporting Overview

Edge Configuration Series Reporting Overview Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed

More information

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com NetFlow Tracker Overview Mike McGrath x ccie CTO mike@crannog-software.com 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK

More information

E6998-02: Internet Routing

E6998-02: Internet Routing E6998-02: Internet Routing Lecture 13 Border Gateway Protocol, Part II John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE White Paper Meeting the Five Key Needs of Next-Generation Cloud Computing Networks Cloud computing promises to bring scalable processing capacity to a wide range of applications in a cost-effective manner.

More information

How More Specifics increase your transit bill (and ways to avoid it)

How More Specifics increase your transit bill (and ways to avoid it) How More Specifics increase your transit bill (and ways to avoid it) Your Speaker Today... Fredy Künzler CTO & Founder kuenzler at init7.net www.init7.net www.blogg.ch www.bgp-and-beyond.com AS13030 Twitter:

More information

Network-Wide Change Management Visibility with Route Analytics

Network-Wide Change Management Visibility with Route Analytics Network-Wide Change Management Visibility with Route Analytics Executive Summary Change management is a hot topic, and rightly so. Studies routinely report that a significant percentage of application

More information

Service Provider Enablement 3.0 Achieving Accelerated Business Gain

Service Provider Enablement 3.0 Achieving Accelerated Business Gain Global Leader in DDoS Mitigation Service Provider Enablement 3.0 Achieving Accelerated Business Gain BENEFITS Comprehensive product range to capture different market segments Turnkey white-label partnership

More information

Teridion. Rethinking Network Performance. The Internet. Lightning Fast. Technical White Paper July, 2015 www.teridion.com

Teridion. Rethinking Network Performance. The Internet. Lightning Fast. Technical White Paper July, 2015 www.teridion.com Teridion The Internet. Lightning Fast. Rethinking Network Performance Technical White Paper July, 2015 www.teridion.com Executive summary Online services face the growing dual challenge of supporting many

More information

BGP1 Multihoming and Traffic Engineering

BGP1 Multihoming and Traffic Engineering 83950 Telecommunications Laboratory Course BGP1 BGP1 Multihoming and Traffic Engineering date & time student # name 1 2 bgp-tyo.tex,v 1.11 2005/04/18 14:09:14 ams Exp 1/17 Part I Home Assignment 1 General

More information

Advanced BGP Policy. Advanced Topics

Advanced BGP Policy. Advanced Topics Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections

More information

The Evolution of the U.S. Internet Peering Ecosystem

The Evolution of the U.S. Internet Peering Ecosystem The Evolution of the U.S. Internet Peering Ecosystem William B. Norton Co-Founder and Chief Technical Liaison Equinix, Inc. NANOG 31 San Francisco, CA Peer Trek Internet Operations Research Research 5

More information

The Value of Flow Data for Peering Decisions

The Value of Flow Data for Peering Decisions The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this

More information

Intelligent Policy Enforcement Solutions for Higher Education Institutions

Intelligent Policy Enforcement Solutions for Higher Education Institutions Intelligent Policy Enforcement Solutions for Higher Education Institutions To do more with your campus network you need to see more. Imagine being able to view network activity down to the granular level,

More information

How To Defend Your Position On Net Neutrality In A Berrycreeper Consultation

How To Defend Your Position On Net Neutrality In A Berrycreeper Consultation BT s Response to BEREC Consultation: An Assessment of IP-interconnection in the context of Net Neutrality 31/07/2012 1 Introduction 1. In the context of Net Neutrality, BT s response to BEREC s consultation

More information

An overview on Internet Measurement Methodologies, Techniques and Tools

An overview on Internet Measurement Methodologies, Techniques and Tools An overview on Internet Measurement Methodologies, Techniques and Tools AA 2012/2013 emiliano.casalicchio@uniroma2.it (Agenda) Lezione 24/04/2013 Part 1 Intro basic concepts ISP Traffic exchange (peering)

More information

Interdomain Routing. Outline

Interdomain Routing. Outline Interdomain Routing David Andersen 15-744 Spring 2007 Carnegie Mellon University Outline What does the Internet look like? Relationships between providers Enforced by: Export filters and import ranking

More information

The fact is that 90% of business strategies are not implemented through operations as intended. Overview

The fact is that 90% of business strategies are not implemented through operations as intended. Overview Overview It is important to recognize that a company s network determines its supply chain efficiency and customer satisfaction. Designing an optimal supply chain network means the network must be able

More information

Service Description DDoS Mitigation Service

Service Description DDoS Mitigation Service Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Contents Contents 1 Introduction...3 2 An Overview...3

More information

EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE

EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE A reliable, high-performance network is critical to your IT infrastructure and organization. Equally important to network performance

More information

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)

BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543) BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE

More information

Integrating F5 Application Delivery Solutions with VMware View 4.5

Integrating F5 Application Delivery Solutions with VMware View 4.5 APPLICATION READY SOLUTION GUIDE What s inside: 2 Improving user experience 2 Enhancing security and access control 3 Application Performance and Availability 4 F5 and global configuration diagram 5 More

More information

Netflix Open Connect Network. PTT Forum December 2012 Flavio Amaral (South America Network Strategy)

Netflix Open Connect Network. PTT Forum December 2012 Flavio Amaral (South America Network Strategy) Netflix Open Connect Network PTT Forum December 2012 Flavio Amaral (South America Network Strategy) 1 Overview Introduction to Netflix Netflix in Brazil Peering and Plans for 2013 Open Connect, the Netflix

More information

Internet Traffic and Content Consolidation

Internet Traffic and Content Consolidation Internet Traffic and Content Consolidation Craig Labovitz Chief Scientist, Arbor Networks S. Iekel-Johnson, D. McPherson Arbor Networks, Inc. J. Oberheide, F. Jahanian University of Michigan Talk Outline

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

L4: ISPs, Backbones and Peering

L4: ISPs, Backbones and Peering L4: ISPs, Backbones and Peering 15 September 2015 (From Kobe) Bill Nace Material from Computer Networking: A Top Down Approach, 5 th edition. J.F. Kurose and K.W. Ross Administrivia Norton2010 Paper Review

More information

Radware s Attack Mitigation Solution On-line Business Protection

Radware s Attack Mitigation Solution On-line Business Protection Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...

More information

Traffic & Peering Analysis

Traffic & Peering Analysis Traffic & Peering Analysis or how I learned to stop worrying and love route hijacking Pete Crocker pete@packetdesign.com Agenda Alternate methods of traffic / peering analysis Traffic Matrices Pros & Cons

More information

FAQ: BroadLink Multi-homing Load Balancers

FAQ: BroadLink Multi-homing Load Balancers FAQ: BroadLink Multi-homing Load Balancers BroadLink Overview Outbound Traffic Inbound Traffic Bandwidth Management Persistent Routing High Availability BroadLink Overview 1. What is BroadLink? BroadLink

More information

CCS (Leeds) Ltd. Leased Line Solutions

CCS (Leeds) Ltd. Leased Line Solutions CCS (Leeds) Ltd Leased Line Solutions Our leased line services are provided with fully managed hardware, are pro-actively monitored at ten second intervals and transparently reported in real time in our

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and

More information

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding

More information

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B. ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow

More information

Multiscreen Video Processing Monetisation

Multiscreen Video Processing Monetisation Application Note September 2013 Multiscreen Video Processing Monetisation Multiscreen up-ends existing TV business models, but at the same time the unicast nature of OTT delivery provides opportunities

More information

The Emerging 21 st Century Access Power Peering (*)

The Emerging 21 st Century Access Power Peering (*) The Emerging 21 st Century Access Power Peering (*) William B. NORTON DrPeering International, Palo Alto, CA USA Abstract: From the beginning of the Internet as a government-funded network of networks

More information

Traffic Monitoring : Experience

Traffic Monitoring : Experience Traffic Monitoring : Experience Objectives Lebah Net To understand who and/or what the threats are To understand attacker operation Originating Host Motives (purpose of access) Tools and Techniques Who

More information

Global IP Network Mobility

Global IP Network Mobility Brian L. Skeen brian.l.skeen@boeing.com Global IP Network Mobility using Border Gateway Protocol (BGP) BGP Network Mobility Connexion Service Summary Current IP Mobility standards Network and Service Challenges

More information

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6 (Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

C C S ( L e e d s ) L t d

C C S ( L e e d s ) L t d C C S ( L e e d s ) L t d L E A S E D L I N E S O L U T I O N S L E A S E D L I N E S E R V I C E S Leased line services from CCS Leeds will provide your company with bespoke solutions to ensure that your

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

IAB IPv6 Multi-Homing BOF. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

IAB IPv6 Multi-Homing BOF. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI IAB IPv6 Multi-Homing BOF Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Multi-homing Problems Inbound to the destination traffic engineering is needed Current

More information

B Series Personal Notification via SMS and Email

B Series Personal Notification via SMS and Email Security Systems Abstract B Series Personal Notification via SMS and Email White Paper The Bosch B Series control panel version 2.00 introduced the ability for end users of the system to receive emails

More information

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations

More information

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in

More information

WHITE PAPER. Gaining Total Visibility for Lawful Interception

WHITE PAPER. Gaining Total Visibility for Lawful Interception WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...

More information

Traffic Analysis With Netflow. The Key to Network Visibility

Traffic Analysis With Netflow. The Key to Network Visibility Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators

More information

Expert Reference Series of White Papers. The Basics of Configuring and Using Cisco Network Address Translation

Expert Reference Series of White Papers. The Basics of Configuring and Using Cisco Network Address Translation Expert Reference Series of White Papers The Basics of Configuring and Using Cisco Network Address Translation 1-800-COURSES www.globalknowledge.com The Basics of Configuring and Using Cisco Network Address

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Enhancing Network Monitoring with Route Analytics

Enhancing Network Monitoring with Route Analytics with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments

More information

Vyatta Network OS for Network Virtualization

Vyatta Network OS for Network Virtualization Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components

More information

Peering in Hong Kong. Che-Hoo CHENG CUHK/HKIX www.hkix.net

Peering in Hong Kong. Che-Hoo CHENG CUHK/HKIX www.hkix.net Peering in Hong Kong Che-Hoo CHENG CUHK/HKIX www.hkix.net How Internet Operates in simple terms Internet is composed of networks of ISPs and users User networks connect to ISPs Small ISPs connect to large

More information

APNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0

APNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0 erou03_v1.0 APNIC elearning: BGP Basics Contact: training@apnic.net Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes

More information

Founded in 2003, Worldwebnet Telecom is a fast growing Canadian owned and operated carrier that specializes in providing voice services to the

Founded in 2003, Worldwebnet Telecom is a fast growing Canadian owned and operated carrier that specializes in providing voice services to the Founded in 2003, Worldwebnet Telecom is a fast growing Canadian owned and operated carrier that specializes in providing voice services to the wholesale, retail and business markets. Carrier Services Access

More information

Verizon Business International Partner Services. Wholesale & Carrier Guide

Verizon Business International Partner Services. Wholesale & Carrier Guide Verizon Business International Partner Services Wholesale & Carrier Guide Verizon Business International Partner Services Partnership that builds your business Verizon Business is a leading provider of

More information

Troubleshooting Application Performance Issues Across MPLS Networks

Troubleshooting Application Performance Issues Across MPLS Networks Troubleshooting Application Performance Issues Across MPLS Networks Bob Quillin,, VP Product Management, Network Physics bobq@networkphysics.com 1 MPLSCon 2005, New York Today s Agenda Background Brief

More information

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge White Paper The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net October

More information

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring

More information

Chapter 3 Security and Firewall Protection

Chapter 3 Security and Firewall Protection Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+

More information

The Application Front End Understanding Next-Generation Load Balancing Appliances

The Application Front End Understanding Next-Generation Load Balancing Appliances White Paper Overview To accelerate download times for end users and provide a high performance, highly secure foundation for Web-enabled content and applications, networking functions need to be streamlined.

More information

Source-Connect Network Configuration Last updated May 2009

Source-Connect Network Configuration Last updated May 2009 Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network

More information

IP Network Control: Turning an Art into a Science. Case Study: Global Crossing

IP Network Control: Turning an Art into a Science. Case Study: Global Crossing Case Study: Global Crossing IP Network Control: Turning an Art into a Science Company: Industry: Global Crossing Holdings Ltd. Telecommunications Challenge(s): Global Crossing want the visibility and control

More information

Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering

Effective BGP Load Balancing Using The Metric System A real-world guide to BGP traffic engineering Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering NANOG45 January 26, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting.com Introductions Slide 1 Why

More information

CS 40, Lecture 3: Internet economics. Ramesh Johari

CS 40, Lecture 3: Internet economics. Ramesh Johari CS 40, Lecture 3: Internet economics Ramesh Johari Outline Contracts: transit and peer Example 1: Peering and pricing Example 2: Exchanges Example 3: Hot potato routing Example 4: 95 th percentile pricing

More information

Making the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <schecter@akamai.com>

Making the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <schecter@akamai.com> Making the Internet fast, reliable and secure DE-CIX Customer Summit - 2014 Steven Schecter What is a Content Distribution Network RFCs and Internet Drafts define a CDN as: Content

More information

Chapter 49 Border Gateway Protocol version 4 (BGP-4)

Chapter 49 Border Gateway Protocol version 4 (BGP-4) Chapter 49 Border Gateway Protocol version 4 (BGP-4) Introduction... 1-3 Overview of BGP-4... 1-3 BGP Operation... 1-5 BGP Attributes... 1-6 BGP Route Selection... 1-8 Classless Inter-domain Routing (CIDR)

More information

The rise of the hybrid network model

The rise of the hybrid network model The rise of the hybrid network model Hybrid networks offer the promise of greater flexibility and capacity, improved application performance and cheaper price points than traditional Wide Area Networks

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Lead management solution. Tobias Kuen SC-Networks GmbH, Managing Director

Lead management solution. Tobias Kuen SC-Networks GmbH, Managing Director Lead management Lead management solution evalanche is now targeting companies that not only want to benefit from a powerful e-mail marketing solution, but also want to support Marketing and Sales with

More information

How Route Analytics Enables Virtualization and Cloud Computing

How Route Analytics Enables Virtualization and Cloud Computing How Route Analytics Enables Virtualization and Cloud Computing By Jim Metzler, Ashton Metzler & Associates Distinguished Research Fellow and Co-Founder, Webtorials Editorial/Analyst Division Introduction

More information

Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering

Effective BGP Load Balancing Using The Metric System A real-world guide to BGP traffic engineering Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering NANOG46 June 14, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting ~ dot ~ com Introductions Slide

More information

Microsoft Exchange Load Balancing. Unique Applied Patent Technology By XRoads Networks

Microsoft Exchange Load Balancing. Unique Applied Patent Technology By XRoads Networks Microsoft Exchange Load Balancing Unique Applied Patent Technology By XRoads Networks Microsoft Exchange Server Balancing The following is an introduction and overview as to how the EdgeXOS appliances

More information

Global Network Mobility NANOG 31

Global Network Mobility NANOG 31 Ben Abarbanel cbbrouting@boeing.com Global Network Mobility NANOG 31 Implementing Global Network Mobility What is Connexion by Boeing? Summary of the problem Network and Service Challenges BGP as a mobility

More information

Internet Ecosystem. Staffan Göjeryd Vice President Product Management, Head of Operators TeliaSonera Broadband Services

Internet Ecosystem. Staffan Göjeryd Vice President Product Management, Head of Operators TeliaSonera Broadband Services Internet Ecosystem Staffan Göjeryd Vice President Product Management, Head of Operators TeliaSonera Broadband Services Explaining the Internet Ecosystem How is the Internet wired? Is Content King? Hot

More information

Introduction. The Inherent Unpredictability of IP Networks # $# #

Introduction. The Inherent Unpredictability of IP Networks # $# # Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent

More information

Partner with the UK s leading. Managed Security Service Provider

Partner with the UK s leading. Managed Security Service Provider Partner with the UK s leading Managed Security Service Provider The Talk Straight Advantage Established in 2007, Talk Straight is an ISP with a difference, and is at the forefront of a revolution in cloud

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

NovaTel The Next Generation Carrier

NovaTel The Next Generation Carrier NovaTel The Next Generation Carrier The network is the core of your business and our network is built to withstand the most demanding requirements. Designed for tomorrow s needs, NovaTel s network is engineered

More information